Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245838
Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang
This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch
{"title":"Kernel-level intrusion detection method using simplification and grouping","authors":"Bo-heung Chung, Seungho Ryu, Jeong-Nyeo Kim, Jongsoo Jang","doi":"10.1109/ICACT.2005.245838","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245838","url":null,"abstract":"This paper proposes the kernel-level intrusion detection method (KIDM) using simplification and grouping of intrusion detection rules. These rules group into group-rule and common-rule generated by simplification. The intrusion detection is separated into common detection and extended detection step. The packet is checked by common detection using the common-rule. If this step detects nothing, the packet is forwarded to its destination. If not, it is passed into the extended detection using the group-rule. Through grouping of similar detection rules, the search space and searching time can be greatly minimized. Using the simplified rule in intrusion detection, the packet inspection time can be largely reduced. With the help of these two steps, fast and effective intrusion detection is possible in network nodes such as router and switch","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246009
Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou
Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected
{"title":"Steganalysis of facsimile","authors":"Yunbiao Guo, Xingang You, Chuntian Zhang, Lan Hu, Linna Zhou","doi":"10.1109/ICACT.2005.246009","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246009","url":null,"abstract":"Communications associated with illicit activity has become a new focus of advanced communication technology. A steganographic method of binary image, which embeds data in facsimile by modifying the runlength of black pixel can build a covert communication over fax. This letter presents a steganalytic scheme to detect the message embedded in facsimile using run-length modification method. The detection is based on estimation of the original run-length distribution from the stego-facsimile, which is done by filtering stego-facsimile with corresponding filter. Experimental result indicates that relative modifications as small as 10% of usable run-length can be reliably detected","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115611136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246011
Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim
IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool
{"title":"Implementation of light-weight IKE protocol for IPsec VPN within router","authors":"Jae-Deok Lim, Minho Han, Jeong-Nyeo Kim","doi":"10.1109/ICACT.2005.246011","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246011","url":null,"abstract":"IPsec protocol has been widely deployed at remote business environment because of its properties, confidentiality and integrity for network traffic. Before using IPsec protocol, it is needed that negotiations of security associations and keys between two end points of IPsec tunnel. IKE protocol is used when negotiation is done automatically. This paper introduces the light-weight IKE protocol that can be applied to an embedded system such as router. We prove that this IKE protocol has been implemented based on RFC by working with the other commercial IKE protocol and show the negotiation performance of IKE protocol by using test tool","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245944
Dongyoung Kim, Hyochan Bang, Jungchan Na
The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.
{"title":"Intrusion alert normalization method using AWK scripts and attack name database","authors":"Dongyoung Kim, Hyochan Bang, Jungchan Na","doi":"10.1109/ICACT.2005.245944","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245944","url":null,"abstract":"The current several classes of intrusion alert have various formats and semantics. And it is transferred using a variety of protocols. The protocols that transfer intrusion alert are IDXP, SNMP trap, SYSLOG protocol, etc. These varieties of intrusion alert formats make it difficult to use that together. Intrusion alert normalization makes various intrusions alert to same structure data and same semantics. We need this normalization process to unify alerts from a variety of security equipments. This paper describes how to normalize alerts from several IDS and security equipments.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"6 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114104344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246130
Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang
This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.
{"title":"Multiple maneuvering target data association based on genetic algorithms","authors":"Jianhua Wang, Weiting Liu, Min Wang, Bing Zhang, Jian Wang","doi":"10.1109/ICACT.2005.246130","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246130","url":null,"abstract":"This paper studies the problem of data association in multiple maneuvering targets locating and tracking. Genetic algorithm is used successfully in solving the complex optimization and the industrial engineering problem. Recently researching on genetic algorithm has attracted a lot of attention. This paper puts forward a way of using genetic algorithms to resolve the problem of multiple target data association. The simulation results show that the algorithm used in this paper is able to avoid the local extremum and the outcome is satisfactory.","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114465887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245852
Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang
In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time
{"title":"Advanced multicast service scheduling mechanism with IGMP snooping in WDM-PON","authors":"Namuk Kim, H. Yun, Jeong-Ju Yoo, Tae-Yeon Kim, Byeong-Whi Kim, Minho Kang","doi":"10.1109/ICACT.2005.245852","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245852","url":null,"abstract":"In this paper, we deal with the multicast service management to efficiently support the broadcasting TV and the near real time high quality VoD (video on demand) service though the data communication networks. This is an emerging issue of the next generation network. Until now, several network architectures have been proposed but most of these have been concentrated on increase of the basic network bandwidth or induced the higher system complexity. The hybrid WDM-PON guarantees both kinds of traffic the independent and stable service by introducing the shared broadcast wavelength for multicast group traffic service. The proposed dynamic multicast group scheduling (DMGS) based on hybrid WDM-PON efficiently supports the common Internet traffic as well as the large number of multicast groups by maximizing the service share-index of registered multicast groups which uses the broadcast wavelength in real time","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246176
Yang-Hui Chang, T. Chung
Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called "ASDI", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users
目前,视频会议业务是依赖于供应商的业务,会议用户在会议开始之前必须手动预装相同的会议软件。此外,会议用户还必须满足不适应业务的要求。在本文中,我们提出了一种基于元有源网络(YAN)的有源视频会议服务(AVCoS) [Chang Yang-Hui et al.(2002)]。avco采用YAN架构,由应用层、增值层和网络通用层组成。这些组件是可扩展、可替换和可部署的。通过YAN的服务组合,avco允许用户自定义描述概要文件的模板服务,称为“ASDI”,它描述了如何组合这些组件。因此,用户可以通过一个主页来调整服务的功能,以适应当前的会议节点环境和网络环境。然后,ASDP (Active service Deployment Protocol)将根据定制的ASDI,动态地将avco的软件组件部署到活动节点和用户。因此,AVCoS可以适应不同类型的用户
{"title":"AVCoS: the component-based video conference service overactive networks","authors":"Yang-Hui Chang, T. Chung","doi":"10.1109/ICACT.2005.246176","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246176","url":null,"abstract":"Nowadays, a video conference service is a provider-dependent service, in which conferencing users must manually pre-install same conferencing software before a conferencing session startups. Furthermore, the conferencing users must comply with requirements of the un-adaptable service. In this paper, we propose an active video conference service (AVCoS) over Yuan active networks (YAN) [Yang-Hui Chang et al. (2002)]. Following YAN architecture, AVCoS consists of application, value-added and network generic layer components. The components are extendable, replaceable and deployable. Via service compositions of YAN, AVCoS allows a user can customize a template service describing profile, called \"ASDI\", which describes how to composite those components. Therefore, the user can adapt functionalities of the service by a homepage to meet current conference node environment and network environment Then, Active Service Deployment Protocol (ASDP) will deploy software components of AVCoS to active nodes and the users on the fly according to customized ASDI. Thus, AVCoS adapts itself to meet heterogeneous users","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246185
Canfeng Chen, Weilin Wu
Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm
{"title":"Multi-radio aided topology construction for UWB-based WPAN Scatternet","authors":"Canfeng Chen, Weilin Wu","doi":"10.1109/ICACT.2005.246185","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246185","url":null,"abstract":"Wireless personal area network (WPAN) has been deemed one promising networking technique since diverse applications will be applicable in an ad hoc fashion in WPANs such as Bluetooth. Ultra wide band (UWB) has also become one hot research field because of its capability of supporting high-rate short-distance communications, and UWB-based WPAN has been receiving more and more research efforts recently. Though various piconet and scatternet formation algorithms have been proposed for Bluetooth-based WPAN, there is no systematical analysis and scheme for the newly emerged UWB-based WPAN, such as IEEE 802.15.3a, which exhibits some distinctions in topology construction. This paper first compares the difference of topology formation rationale and scheme between Bluetooth and UWB-based WPAN, then points out the fundamental problem pertinent to the piconet inter-connection in UWB-based WPAN. The main contribution of our work is to propose a multi-radio aided topology initialization algorithm without modification to the 802.15.3a specification. With the goal that all the participating devices get connected, the topology construction algorithm mainly includes bridge function, device positioning, and deliberate interconnections. A simulation-based study has shown that, compared with standard piconet initialization process, the network connectivity can be greatly enhanced by the proposed algorithm","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.245999
Ali Tinati, B. Mozaffary
In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully
{"title":"A novel method for noise cancellation of speech signals using wavelet packets","authors":"Ali Tinati, B. Mozaffary","doi":"10.1109/ICACT.2005.245999","DOIUrl":"https://doi.org/10.1109/ICACT.2005.245999","url":null,"abstract":"In this paper a novel method for cancellation of broadband/narrowband noise from speech signals is proposed. Independent component analysis (ICA) and wavelet packet approaches have been combined for blind noise separation from mixtures of speech signals. ICA method is used to estimate matrix A, which defines how the mixture signals have been mixed. Wavelet packets are used for de-correlation of approximation of noise and speech. This algorithm is applied to real data with high SNRs and has been able to completely retrieve speech signal from white background noise successfully","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2005-07-11DOI: 10.1109/ICACT.2005.246081
Mao-Hsiu Hsu, Jhin-Fang Huang
In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure
{"title":"High performance and low complexity Max-Log-MAP algorithm for FPGA turbo decoder","authors":"Mao-Hsiu Hsu, Jhin-Fang Huang","doi":"10.1109/ICACT.2005.246081","DOIUrl":"https://doi.org/10.1109/ICACT.2005.246081","url":null,"abstract":"In this paper, we focus on implementing turbo decoder compliant with 3GPP spec, we adopted sliding window method with forward state metric as an accuracy initialization value and a modified Max-Log-MAP algorithm which modify extrinsic information by a scaling factor R. Then, we can implement the whole turbo decoder with a single-decoder structure, producing high data throughput with lower logic gates usage. The FPGA design of our proposed structure (SW-modified Max-Log-MAP) results in only 0.1 dB away from the optimal structure (SW-Log-MAP) at BER=10-4. It also saves about 29% hardware cost than the optimal structure","PeriodicalId":293442,"journal":{"name":"The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}